Preferred Language
Articles
/
joe-477
A Visual Interface Design for Evaluating the Quality of Google Map Data for some Engineering Applications
...Show More Authors

Today, there are large amounts of geospatial data available on the web such as Google Map (GM), OpenStreetMap (OSM), Flickr service, Wikimapia and others. All of these services called open source geospatial data. Geospatial data from different sources often has variable accuracy due to different data collection methods; therefore data accuracy may not meet the user requirement in varying organization. This paper aims to develop a tool to assess the quality of GM data by comparing it with formal data such as spatial data from Mayoralty of Baghdad (MB). This tool developed by Visual Basic language, and validated on two different study areas in Baghdad / Iraq (Al-Karada and Al- Kadhumiyah). The positional accuracy was assessed by adopting National Standard for Spatial Data Accuracy (NSSDA). The evaluation procedure also involved one and two-sample t-test to analyze and compare the accuracy of two study areas. The findings found that the NSSDA accuracy of case study one was 15.48 m, while it was 8.71 m for case study two. This indicated that the accuracy of the GM data is different from site to site. The results also showed that the difference on mean was 6.16 m, which indicated that there is a difference in GM accuracy in different areas. It was concluded that the GM data is inappropriate for engineering applications that require high accuracy, but may be appropriate for applications that need low accuracy such as the primarily surveying of engineering design projects, tourism and reconnaissance….etc.

 

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Intelligent Systems And Applications In Engineering
Artificial Intelligence Based Statistical Process Control for Monitoring and Quality Control of Water Resources: A Complete Digital Solution
...Show More Authors

Scopus (5)
Scopus
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
The aesthetics of design shape of the interior spaces for the syndicate of physicians: ريم باسل نوري
...Show More Authors

The research dealt with the topic ' the aesthetics of design shape of interior spaces for the syndicate of physicians' as it reflects visions evolving to the level of tasting and positive interpretation for the space of work to be on a high design level.The research consisting of four chapters as follow; The first chapter examined the problem of the research contracted in the following question: Have the design shapes any role in achieving and showing the aesthetic side for the syndicate of physicians? so the goal of the research was showing the aesthetics of design shape of interior spaces for the syndicate of physicians, The chapter also included the objective spatial and temporal limits of research .Finally the terms were specified. T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology (jatit)
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication
Publication Date
Thu Apr 20 2023
Journal Name
Fire
An Efficient Wildfire Detection System for AI-Embedded Applications Using Satellite Imagery
...Show More Authors

Wildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob

... Show More
View Publication
Scopus (27)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon Nov 21 2022
Journal Name
Sensors
Deep Learning-Based Computer-Aided Diagnosis (CAD): Applications for Medical Image Datasets
...Show More Authors

Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the bes

... Show More
View Publication
Scopus (35)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis of Some New Schiff Bases Starting from 2,2 Dimorpholinyl Acetic Acid and Evaluating the Biological activity
...Show More Authors

n this study new derivatives of Schiff bases (5-10) were synthesized from the new starting material 1 . Which has been synthesized by the reaction of (1 mol.) of dichloroacetic acid with two moles of morpholine, in the presence of potassium hydroxide, Ester derivatives 2 and 3 were synthesized by the reaction of 1 with methanol or ethanol respectively in the presence of sulphuric acid as catalyst . Compound 2 was also prepared from dimethylsulphate with high yield , 2 and 3 was used to synthesized 2,2-dimorpholinylacetohydrazide 4 via reaction with NH2NH2.H2O 80% .Imines (5-10) were synthesized via the reaction of 4 with appropriate aromatic aldehydes in the presence of G.A.A as a catalyst . Derivatives compounds (1-10) were identifie

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
 Assignment method in the Holy Quran and some of its applications in Surat Al-Anaam
...Show More Authors

Research objective: This research aims to unveil how to use the method of referral in understanding the Holy Quran.
        The reason for choosing the research: The one that invited me to write on this topic is the importance of the referral method, so I liked the research in it, and unveiled this wonderful Qur’anic method, so that it helps to understand the intention of God Almighty in his dear book.
       The research plan: The research was divided into three topics and a conclusion.
   As for the first topic, it is divided into two requirements. The first requirement deals with the definition of referral language.
In the second re

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 18 2026
Journal Name
Journal Of Physical Education
A study of some variables biomechanics in clean and jerk for the world champions men and women
...Show More Authors

View Publication
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Cathodic Protection for Above Ground Storage Tank Bottom Using Data Acquisition
...Show More Authors

Impressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.

In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi

... Show More
View Publication Preview PDF